Reverse-based intrusion detection system and reverse-based intrusion detection method

An intrusion detection system and intrusion detection technology, applied in transmission systems, electrical components, etc., can solve the problems of stealing users, increasing the difficulty of review and certification, and achieve the effect of reducing overhead and simple detection rules

Active Publication Date: 2014-04-23
WUHAN HONGXU INFORMATION TECH
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among the 26,580 types of malicious software, 12% of them have the phenomenon of stealing users' private information such as geographic location information, address book, SMS and device information, etc.
The research results show that among the 33 pop

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reverse-based intrusion detection system and reverse-based intrusion detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below in conjunction with accompanying drawing and embodiment describe in detail:

[0047] 1. System

[0048] 1. Overall

[0049] Such as figure 1 , the system includes a data extraction module 100, a reverse analysis module 200, an intrusion rule module 300, a response module 400 and a data management module 500;

[0050] Its interaction relationship is:

[0051] The data extraction module 100, the reverse analysis module 200 and the response module 400 interact in turn to realize the extraction of network data packets, reverse analysis and response to intrusion behavior;

[0052] The reverse analysis module 200 interacts with the intrusion rule module 300 and the data management module 500 respectively to realize the accumulation and storage of intrusion behavior rules;

[0053] The data extraction module 100 and the response module 400 respectively interact with the data management module 500 to realize the generation of system logs and network logs, thereby iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reverse-based intrusion detection system and a reverse-based intrusion detection method and relates to the field of network encryption protocols. The system comprises a data extraction module, a reverse analysis module, an intrusion rule module, a response module and a data management module. The method comprises the following steps: (1) capturing all network data packages running through an Android phone by the data extraction module, sending to a reverse analysis engine, acquiring network processes and user behaviors by the data extraction module to generate a system log and a weblog, and sending the system log and the weblog to the data management module; (2) identifying intrusion behaviors by the reverse analysis engine through the TCP/IP (transmission control protocol /Internet protocol) analysis technology and the apk decompilation reverse technology by combining the system log and the weblog; (3) performing warning and recording on the intrusion behaviors identified by the reverse analysis engine through the response module; (4) storing all information of a user in the data management module so as to facilitate later evidence collection and lookup. The reverse-based intrusion detection system and the reverse-based intrusion detection method disclosed by the invention have safety, timeliness, expandability and advancement.

Description

technical field [0001] The invention relates to the field of network encryption protocols, in particular to a reverse-based intrusion detection system and its method, which have the advantages of scalability and high timeliness. Background technique [0002] According to the "Mobile Phone Security Industry Analysis Report for the First Half of 2013" released by Security Manager, a professional mobile phone antivirus software company, in the first half of 2013, a total of 33,930 types of mobile phone malware were found, including 26,580 types of malware based on the Android platform. Very fast. Among the 26,580 types of malicious software, 12% of them have the phenomenon of stealing users' private information such as geographic location information, address book, SMS and device information. The intrusion detection system can identify the intrusion behavior and effectively suppress the danger of stealing the user's private information, which has great practical value for main...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 匡红保勇武
Owner WUHAN HONGXU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products